Clearer than Mud: Extending Manufacturer Usage Description (MUD) for Securing IoT Systems
Internet of Things (IoT) devices, expected to increase exponentially over the next several years, are easy targets for attackers. To make these devices more secure, the IETF’s draft of Manufacturer Usage Description (MUD) provides a means for the manufact
- PDF / 886,641 Bytes
- 15 Pages / 439.37 x 666.142 pts Page_size
- 50 Downloads / 155 Views
Abstract. Internet of Things (IoT) devices, expected to increase exponentially over the next several years, are easy targets for attackers. To make these devices more secure, the IETF’s draft of Manufacturer Usage Description (MUD) provides a means for the manufacturer of an IoT device to specify its intended purpose and communication patterns in terms of access control lists (ACLs), thereby defining the device’s normal behaviour. However, MUD may not be sufficient to comprehensively capture the normal behaviour specification, as it cannot incorporate variable operational settings that depend on the environment. Further, MUD only supports limited features. Our approach overcomes these limitations by allowing the administrator to define the normal behaviour by choosing combinations from a wider set of features that includes physical layer parameters, values of packet headers, and flow statistics. We developed and implemented a learning-based system that captures and demodulates wireless packets from IoT devices over a period of time, extracts the features specified in the normal behaviour specification, and uses a learning algorithm to create a normal model of each device. Our implementation also enforces these normal models by detecting violations and taking appropriate actions, in terms of ACLs on an Internet Gateway, against the misbehaving devices. Hence, our framework makes the specification tighter and clearer than what is possible with MUD alone, thereby making IoT systems more secure. Keywords: Internet of Things · Security · Manufacturer Usage Description (MUD) · Clustering
1
Introduction
Internet of Things (IoT), defined as an interconnection of things, people, data, and processes meant to achieve some specified business goals, is an important This material is based upon work supported in whole or in part with funding from the United States Department of Defense (DoD). Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of any agency or entity of the United States Government. c Springer Nature Switzerland AG 2019 V. Issarny et al. (Eds.): ICIOT 2019, LNCS 11519, pp. 43–57, 2019. https://doi.org/10.1007/978-3-030-23357-0_4
44
S. Singh et al.
emerging technology that is being leveraged heavily by companies. The Business Insider predicts that companies will accelerate their investment in IoT solutions, with the aggregate investment forecasted to be $15 trillion between 2017 and 2025 [29]. Wireless sensor networks (WSN) are a key foundation of IoT solutions, helping things to communicate data to people and processes, and vice versa. WSNs comprise multiple sensors spread across an area, that measure certain physical parameters of the environment and communicate these measurements wirelessly to a gateway, which in turn forwards it to a control server. WSNs may also “close the loop”, i.e. the control server may process these measurements and command some actuators to perform actions to control some physical parameters.
Data Loading...